{"id":180973,"date":"2017-03-02T14:18:31","date_gmt":"2017-03-02T19:18:31","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/artificial-intelligence-being-turned-against-spyware-horizon-magazine\/"},"modified":"2017-03-02T14:18:31","modified_gmt":"2017-03-02T19:18:31","slug":"artificial-intelligence-being-turned-against-spyware-horizon-magazine","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/artificial-intelligence\/artificial-intelligence-being-turned-against-spyware-horizon-magazine\/","title":{"rendered":"Artificial intelligence being turned against spyware &#8211; Horizon magazine"},"content":{"rendered":"<p><p>    Gone are the days of the hobbyist    hackermodern malware is    a trillion-euro business.  <\/p>\n<p>    Dr Eva Maia at VisionTechLab, a young cybersecurity firm in    Matosinhos, Portugal, said that attacks on computer networks    are not only multiplying, they are also growing sneakier.  <\/p>\n<p>    Malwares typically go unnoticed for months by remaining    dormant on infected computers, said Dr Maia. This was    recently the case in the Panama Papers attack, where no one    knew that the network had been compromised until long after the    damage was done.  <\/p>\n<p>    In the EU-funded SecTrap project, VisionTechLab has been    studying the market for a new line of defence that could rob    malicious software of its current hiding places.  <\/p>\n<p>    Conventional antiviruses and firewalls are trained like    nightclub bouncers to block known suspects from entering the    system. But new threats can be added to the wanted list only    after causing trouble. If computers could instead be trained as    detectives, snooping around their own circuits and identifying    suspicious behaviour, hackers would have a harder time    camouflaging their attacks.  <\/p>\n<p>    The challenge is that machines have traditionally been built to    follow orders, not recognise patterns or draw conclusions. Dr    Maia is working on advances in artificial intelligence (AI) to    change that.  <\/p>\n<p>    Bootcamp  <\/p>\n<p>    We are seeing a boom in AI techniques, said Dr Maia.    Research that was previously theoretical is now moving from    academic laboratories to industry at an unprecedented pace.  <\/p>\n<p>      Research that was previously theoretical is now moving      from academic laboratories to industry at an unprecedented      pace.    <\/p>\n<p>        Dr Eva Maia, VisionTechLab, Portugal      <\/p>\n<p>    Over the past few years, computers have started driving passenger cars,following    voice orders and outmatching humans at identifying faces on    photographs. These breakthroughs are the fruit of a new trend    in AI based on mimicking living neural networks.  <\/p>\n<p>    In the same way as our brains sort new information based on    past experiences, enough practice data can teach computers to    learn, categorise and generalise for themselves.  <\/p>\n<p>    How many examples are needed to identify a trend can run into    astronomical numbers. Fortunately, vast hoards of behavioural    data are strewn everyday across the internet by heedless    bloggers, commentators and social media users.  <\/p>\n<p>    Computers learnt their first cognitive functions by devouring    terabytesof this online text, sound    and images. With the help of recent computing power and the    kind of algorithms developed by Dr Maia, they have become so    good at identifying content that they now label some of it for    us.  <\/p>\n<p>    The challenge in cybersecurity is to use this ability to    distinguish between innocent and malicious behaviour on a    computer. For this, Alberto Pelliccione, chief executive of    ReaQta, a cybersecurity venture in Valletta, Malta, has found    an analogous way of educating by experience.  <\/p>\n<p>    ReaQta breeds millions of malware programs in a virtual testing    environment known as a sandbox, so that algorithms can inspect    their antics at leisure and in safety. It is not always    necessary to know what they are trying to steal. Just to record    the applications that they open and their patterns of operation    can be enough.  <\/p>\n<p>    So that the algorithms can learn about business as usual, they    then monitor the behaviour of legal software, healthy    computers, and ultimately the servers of each new client. Their    lesson never ends. The algorithms continue to learn from their    users even after being put into operation.  <\/p>\n<p>    In doing so, ReaQtas algorithms can assess whether programs or    computers are behaving unusually. If they are, they inform    human operators, who can either shut them down or study the    tactics of the malware infecting them. The objective of the    artificial intelligence is not to teach computers what we    define as good or bad data, but to spot anomalies, said    Pelliccione.  <\/p>\n<p>    Nowhere to hide  <\/p>\n<p>    This is welcome news for IT administrators. Cyber criminals    typically attack the computer networks of large organisations    by compromising the machines of less security-savvy users on    their periphery and working their way through to the centre. A    few weak links in a sprawling network are difficult to spot and    can progressively put an entire company at risk.  <\/p>\n<\/p>\n<p>    To make matters worse, hackers install dormant access points on    each machine that they compromise. If security analysts manage    to block one, hackers return through another. Dormant access    points are notoriously difficult to spot because they do    nothing until hackers activate them.  <\/p>\n<p>    As part of the European ProBOS project, ReaQta has developed    software that can be nested at the very core of machines,    between their operating system and hardware. Its role is to    monitor daily operations in every corner of the system,    allowing AI algorithms to sift through ubiquitous data and spot    any malicious installation.  <\/p>\n<p>    ReaQta is licensing the security platform across European and    Southeast Asian markets this month. Its first clients are    companies that operate over 500 computers simultaneously.  <\/p>\n<p>    Next year, VisionTechLab plans to release its first AI security    services for banks and governments. In the longer term, Dr Maia    sees applications for individuals.  <\/p>\n<p>    For all the benefits of mobile devices, social networking and    cloud computing, these technologies are placing more private    data at risk. While AI may not yet be capable of guaranteeing    its safety, it can now shine a powerful search light on any    attempts to steal it.  <\/p>\n<p>    If you liked this article, please consider sharing it on    social media.  <\/p>\n<p>      Cybersecurity is at the heart of the EU's strategy for the      Digital Single Market.    <\/p>\n<p>      The EU's cybersecurity strategy was created to      embed cybersecurity into new policies in areas such as      automated driving, make the EU a strong player in the      cybersecurity market, and ensure that all Member States have      similar capabilities to fight cyber crime.    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View post:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/horizon-magazine.eu\/article\/artificial-intelligence-being-turned-against-spyware_en.html\" title=\"Artificial intelligence being turned against spyware - Horizon magazine\">Artificial intelligence being turned against spyware - Horizon magazine<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Gone are the days of the hobbyist hackermodern malware is a trillion-euro business. Dr Eva Maia at VisionTechLab, a young cybersecurity firm in Matosinhos, Portugal, said that attacks on computer networks are not only multiplying, they are also growing sneakier <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/artificial-intelligence\/artificial-intelligence-being-turned-against-spyware-horizon-magazine\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187742],"tags":[],"class_list":["post-180973","post","type-post","status-publish","format-standard","hentry","category-artificial-intelligence"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/180973"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=180973"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/180973\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=180973"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=180973"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=180973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}